2025-03-16 03:03:50 +00:00

60 lines
2.5 KiB
JSON

{
"id": "CVE-2025-27816",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-07T08:15:44.527",
"lastModified": "2025-03-07T20:15:38.900",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in the Arctera InfoScale 7.0 through 8.0.2 where a .NET remoting endpoint can be exploited due to the insecure deserialization of potentially untrusted messages. The vulnerability is present in the Windows Plugin_Host service, which runs on all the servers where InfoScale is installed. The service is used only when applications are configured for Disaster Recovery (DR) using the DR wizard. Disabling the Plugin_Host service manually will eliminate the vulnerability."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en Arctera InfoScale 7.0 a 8.0.2, en la que se puede explotar un endpoint remoto .NET debido a la deserializaci\u00f3n insegura de mensajes potencialmente no confiables. La vulnerabilidad est\u00e1 presente en el servicio Plugin_Host de Windows, que se ejecuta en todos los servidores donde est\u00e1 instalado InfoScale. El servicio se utiliza solo cuando las aplicaciones est\u00e1n configuradas para recuperaci\u00f3n ante desastres (DR) mediante el asistente de recuperaci\u00f3n ante desastres. Deshabilitar el servicio Plugin_Host manualmente eliminar\u00e1 la vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://www.veritas.com/content/support/en_US/security/ARC25-002",
"source": "cve@mitre.org"
}
]
}